咨询与建议

限定检索结果

文献类型

  • 1,343 篇 会议
  • 215 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 1,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 852 篇 计算机科学与技术...
    • 736 篇 软件工程
    • 223 篇 信息与通信工程
    • 116 篇 控制科学与工程
    • 106 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 64 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 安全科学与工程
    • 39 篇 光学工程
    • 38 篇 机械工程
    • 29 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 28 篇 建筑学
    • 25 篇 土木工程
    • 24 篇 仪器科学与技术
  • 422 篇 理学
    • 253 篇 数学
    • 116 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 57 篇 系统科学
  • 317 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 60 篇 医学
    • 58 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 59 篇 法学
    • 42 篇 社会学
  • 37 篇 教育学
    • 37 篇 教育学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 19 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 56 篇 software
  • 54 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 feature extracti...
  • 36 篇 computer science
  • 36 篇 accuracy
  • 33 篇 computational mo...
  • 30 篇 real-time system...
  • 30 篇 semantics
  • 29 篇 deep learning
  • 29 篇 artificial intel...
  • 28 篇 training
  • 23 篇 data models
  • 22 篇 data mining
  • 21 篇 internet of thin...
  • 21 篇 analytical model...
  • 20 篇 support vector m...
  • 20 篇 wireless sensor ...
  • 20 篇 predictive model...
  • 20 篇 machine learning...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 9 篇 school of softwa...
  • 9 篇 nicta victoria r...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 university of re...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 stuckey peter j.
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain

语言

  • 1,532 篇 英文
  • 53 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=dept of Computer Science and Software Engineering"
1597 条 记 录,以下是731-740 订阅
排序:
Planning for performance: Persistent collective operations for MPI  17
Planning for performance: Persistent collective operations f...
收藏 引用
24th European MPI Users" Group Meeting, EuroMPI 2017
作者: Morgan, Bradley Holmes, Daniel J. Skjellum, Anthony Bangalore, Purushotham Sridharan, Srinivas Auburn University United States EPCC University of Edinburgh Scotland United Kingdom Dept. of Computer Science and Software Engineering Auburn University United States Dept. of Computer Science University of Alabama at Birmingham BirminghamAL35294-1170 United States SimCenter University of Tennessee ChattanoogaTN United States Intel Corporation 23-56P Outer Ring Road Bangalore560017 India
Advantages of nonblocking collective communication in MPI have been established over the past quarter century, even predating MPI-1. For regular computations with fixed communication patterns, more optimizations can b... 详细信息
来源: 评论
software Defect Prediction using Feature Selection and Random Forest Algorithm
Software Defect Prediction using Feature Selection and Rando...
收藏 引用
International Conference on New Trends in Computing sciences (ICTCS)
作者: Dyana Rashid Ibrahim Rawan Ghnemat Amjad Hudaib Dept. of Computer Science Princess Sumaya University for Technology Amman Jordan Dept. of Software Engineering University of Jordan Amman Jordan
software testing is the most important task in software production and it takes a lot of time, cost and effort. Thus, we need to reduce these resources. software Defect Prediction (SDP) mechanisms are used to enhance ... 详细信息
来源: 评论
360◦ Panorama cloning on sphere
arXiv
收藏 引用
arXiv 2017年
作者: Zhao, Qiang Wan, Liang Feng, Wei Zhang, Jiawan Wong, Tien-Tsin Institute of Computing Technology Chinese Academy of Sciences China School of Computer Software Tianjin University China School of Computer Science and Technology Tianjin University China Dept. of Computer Science and Engineering Chinese University of Hong Kong
In this paper, we address a novel problem of cloning a patch of the source spherical panoramic image to the target spherical panoramic image, which we call 360◦ panorama cloning. Considering the sphere geometry constr... 详细信息
来源: 评论
3D face recognition via discriminative keypoint selection
3D face recognition via discriminative keypoint selection
收藏 引用
International Conference on Ubiquitous Robots and Ambient Intelligence (URAI)
作者: Jiwhan Kim Dongyoon Han Wonjun Hwang Junmo Kim School of Electrical Engineering Korea Advanced Institute of Science and Technology Daejeon South Korea Dept. of Software and Computer Engineering Ajou University Suwon South Korea
In this paper, we propose a discriminative keypoint selection-based 3D face recognition method that is superior to prevalent techniques in terms of both computational complexity and performance. We use the average fac... 详细信息
来源: 评论
Identifying recent behavioral data length in mobile phone log
arXiv
收藏 引用
arXiv 2017年
作者: Sarker, Iqbal H. Kabir, Muhammad Ashad Colman, Alan Han, Jun Dept. of Computer Science Software Engineering Swinburne University of Technology VIC Australia School of Computing and Mathematics Charles Sturt University NSW Australia
Mobile phone log data (e.g., phone call log) is not static as it is progressively added to day-by-day according to individual's diverse behaviors with mobile phones. Since human behavior changes over time, the mos... 详细信息
来源: 评论
Neighboring Zipcodes -- with a new distance mapping method for better accuracy  13
Neighboring Zipcodes -- with a new distance mapping method f...
收藏 引用
13th IEEE International Conference on Networking, Sensing, and Control (ICNSC)
作者: Apgar, Jordan Yu, Cui Dept. Computer Science and Software Engineering Monmouth University West Long Branch NJ United States
The basis for this project was to attempt to improve upon searches for neighboring zipcodes. Simple search algorithms lack the granularity to properly determine nearby zipcodes. In this paper, we include data concerni... 详细信息
来源: 评论
A comprehensive study on real world concurrency bugs in ***  17
A comprehensive study on real world concurrency bugs in ***
收藏 引用
IEEE International Conference on Automated software engineering (ASE)
作者: Jie Wang Wensheng Dou Yu Gao Chushu Gao Feng Qin Kang Yin Jun Wei University of Chinese Academy of Sciences China Chinese Academy of Sciences Institute of Software China Dept. of Computer Science and Engineering The Ohio State University United States
*** becomes increasingly popular in building server-side JavaScript applications. It adopts an event-driven model, which supports asynchronous I/O and non-deterministic event processing. This asynchrony and non-determ... 详细信息
来源: 评论
A template approach for group key distribution in dynamic ad-hoc groups
A template approach for group key distribution in dynamic ad...
收藏 引用
IFIP Networking Conference
作者: Bruhadeshwar Bezawada Alex X. Liu Xiaojiang Liang Rui Li National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Dept. of Computer Science and Engineering Michigan State University USA Mahindra Ecole Centrale School of Engineering Sciences Hyderabad India College of Computer Science and Networking Security Dongguan University of Technology
The ubiquitous wireless communication medium poses serious threats to the confidentiality and integrity of communication in constrained networks like Internet-of-Things (IoT), sensor nodes or ad-hoc groups of soldiers... 详细信息
来源: 评论
Enhancing security for two-party comparison over encrypted data  3
Enhancing security for two-party comparison over encrypted d...
收藏 引用
2016 3rd International Conference on Systems and Informatics, ICSAI 2016
作者: Yang, Ching-Nung Yeh, Zong-Xuan Hsu, Shen-Chieh Fu, Zhangjie Dept. of Computer Science and Information Engineering National Dong Hwa University Hualien Taiwan School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
The so-called Yao's millionaire problem (YMP) is about securely comparing two numbers held by two parties, respectively. After comparison, the actual values of these two numbers are still unknown to both parties. ... 详细信息
来源: 评论
Mobile phone antenna
Mobile phone antenna
收藏 引用
International SoC Design Conference, ISOCC
作者: Cheng Zhu Zhao Wang Mark Leach Kalok Man Eng Gee Lim Dept. of Electrical and Electronic Engineering Daegu University Gyeongsan South Korea Dept. of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool Univeristy Suzhou P.R. China Xi'an Jiaotong-Liverpool University Suzhou Jiangsu CN
This paper aims at developing an operative and reliable internal Planar Inverted F Antenna (PIFA) for mobile phone utilization with designed frequency bands at GSM900, GSM1800/1900, UMTS2100 and LTE2300/2500. Addition... 详细信息
来源: 评论